State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Designing and implementing a family of intrusion detection systems
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Towards NIC-based intrusion detection
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Detecting impersonation attacks in future wireless and mobile networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Hi-index | 0.00 |
This paper describes an intrusion detection system to identify impersonation attacks and Sybil attacks in wireless networks. The detection system uses radio device fingerprinting and has experimental performance comparable with existing intrusion detection methods. The detection systems for Sybil attacks have not been widely investigated to date, and this contribution of the paper is novel. The paper also derives analytical formulae relating metrics of the fingerprinting classification procedure with the metrics of the intrusion detection system. The formulae can be used to guide the selection of the fingerprinting classification method, knowing the desired performance of the detection system. The use of radio device fingerprinting simplifies the task of securing a wireless ad-hoc network.